A new frontier for IoT security emerging from three decades of key generation relying on wireless channels

J Zhang, G Li, A Marshall, A Hu, L Hanzo - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our
everyday life by connecting everyone and everything together. The massive number of …

Survey on physical layer security for 5G wireless networks

JDV Sánchez, L Urquiza-Aguiar, MCP Paredes… - Annals of …, 2021 - Springer
Physical layer security is a promising approach that can benefit traditional encryption
methods. The idea of physical layer security is to take advantage of the propagation …

On the design of secure non-orthogonal multiple access systems

B He, A Liu, N Yang, VKN Lau - IEEE Journal on Selected …, 2017 - ieeexplore.ieee.org
This paper proposes a new design of non-orthogonal multiple access (NOMA) under
secrecy considerations. We focus on a NOMA system, where a transmitter sends confidential …

Covert communication in fading channels under channel uncertainty

K Shahzad, X Zhou, S Yan - 2017 IEEE 85th Vehicular …, 2017 - ieeexplore.ieee.org
A covert communication system under block fading channels is considered, where users
experience uncertainty about their channel knowledge. The transmitter seeks to hide the …

Covert wireless communications under quasi-static fading with channel uncertainty

K Shahzad, X Zhou - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
Covert communications enable a transmitter to send information reliably in the presence of
an adversary, who looks to detect whether the transmission took place or not. We consider …

Covert communication in downlink NOMA systems with channel uncertainty

Y Zhang, W He, X Li, H Peng, K Rabie… - IEEE Sensors …, 2022 - ieeexplore.ieee.org
With the gradual promotion of the fifth generation (5G) mobile communication and Internet of
Things (IoT) applications, wireless communication transmission will be more vulnerable to …

Secrecy-enhancing design for cooperative downlink and uplink NOMA with an untrusted relay

L Lv, H Jiang, Z Ding, L Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We investigate a secrecy-enhancing design for cooperative downlink and uplink non-
orthogonal multiple access (NOMA) transmissions with an untrusted relay. A source uses the …

Two-stage relay selection for enhancing physical layer security in non-orthogonal multiple access

Y Feng, S Yan, C Liu, Z Yang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we examine the physical layer security of a cooperative relay network where
two source-destination pairs communicate through a decode-and-forward (DF) relay in the …

Covert beamforming design for integrated radar sensing and communication systems

S Ma, H Sheng, R Yang, H Li, Y Wu… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
We propose covert beamforming design frameworks for integrated radar sensing and
communication (IRSC) systems, where the radar can covertly communicate with legitimate …

Physical layer security assisted computation offloading in intelligently connected vehicle networks

Y Liu, W Wang, HH Chen, F Lyu, L Wang… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
In this paper, we propose a secure computationoffloading scheme (SCOS) in intelligently
connected vehicle (ICV) networks, aiming to minimize overall latency of computing via …